CA ARCserve D2D Command Execution

CA Technologies support is alerting customers to a security risk associated with CA ARCserve D2D. A vulnerability exists that can allow a remote attacker to access credentials and execute arbitrary commands. CA Technologies has issued a patch to address the vulnerability. The vulnerability is due to improper session handling. A remote attacker can access credentials and execute arbitrary commands.

Share This

CA ARCserve D2D Command Execution

CA Technologies support is alerting customers to a security riskassociated with CA ARCserve D2D. A vulnerability exists that canallow a remote attacker to access credentials and execute arbitrarycommands. CA Technologies has issued a patch to address thevulnerability.

The vulnerability, CVE-2011-3011, is due to improper session handling.A remote attacker can access credentials and execute arbitrarycommands.

Risk Rating

High

Platform

Windows

Affected Products

CA ARCserve D2D r15

How to determine if the installation is affected

Search under TOMCAT directory for "BaseServiceImpl.class", and if thedate is earlier than August 03, 2011, then you should apply fixRO33517.

If you discover a vulnerability in a CA Technologies product, pleasereport your findings to the CA Technologies Product VulnerabilityResponse Team.support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782

Note: Original security notice can be found here (URL may wrap):https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={7D3ACC0F-6C01-4BE2-B5C0-C430CEB45BE6}